Which of the following is the BEST assessment technique in order to identify the application’s security
An existing application has never been assessed from a security perspective. Which of the
following is the BEST assessment technique in order to identify the application’s security posture?
Which of the following describes this form of access control?
A security administrator with full administrative rights on the network is forced to change roles on a
quarterly basis with another security administrator. Which of the following describes this form of
access control?
Which of the following describes this form of authentication?
In order to access the network, an employee must swipe their finger on a device. Which of the
following describes this form of authentication?
which of the following?
MAC filtering is a form of which of the following?
Which of the following tools provides the ability to determine if an application is transmitting a password in
Which of the following tools provides the ability to determine if an application is transmitting a
password in clear-text?
which of the following?
A certificate that has been compromised should be published to which of the following?
which of the following?
NTLM is an improved and substantially backwards compatible replacement for which of the
following?
Which of the following would meet this requirement?
A security administrator is implementing a solution that can integrate with an existing server and
provide encryption capabilities. Which of the following would meet this requirement?
Which of the following are being addressed?
A security administrator working for a health insurance company needs to protect customer data
by installing an HVAC system and a mantrap in the datacenter. Which of the following are being
addressed? (Select TWO).
Which of the following can a security administrator implement to help identify smurf attacks?
Which of the following can a security administrator implement to help identify smurf attacks?